Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4D63CA0F.5080608@redhat.com>
Date: Tue, 22 Feb 2011 15:37:03 +0100
From: Jan Lieskovsky <jlieskov@...hat.com>
To: "Steven M. Christey" <coley@...us.mitre.org>
CC: oss-security <oss-security@...ts.openwall.com>,
        Shawn M Moore <sartak@...tpractical.com>,
        Thomas Sibley <trs@...tpractical.com>,
        Ralf Corsépius
 <rc040203@...enet.de>
Subject: CVE Request -- rt3 -- two issues: 1) Improper management of form
 data resubmittion upon user log out 2) SQL queries information leak by user
 account transition

Hello Josh, Steve, vendors,

   RT3 upstream has released latest v3.8.9 version:
   [1] http://lists.bestpractical.com/pipermail/rt-announce/2011-February/000186.html

   addressing three security flaws:
   1) * Move to a SHA-256 based password hashing scheme
      This has already got CVE id of CVE-2011-0009:
      http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0009

   2) * Redirect users to their desired pages after login.
      This prevents possible back button attacks after a user logs out.

      Further issue details:
      A security flaw was found in the way the RT3 ticketing
      system handled resubmitting of form data after the user
      has logged out of the browser (but not closed it).
      A local attacker could use this flaw to access the user
      account of the victim (login without providing a password
      or obtain user credentials).

      References:
      [a] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614575
      [b] http://lists.bestpractical.com/pipermail/rt-announce/2011-February/000186.html

      Upstream bug report:
      [c] http://issues.bestpractical.com/Ticket/Display.html?id=15804

      Upstream changeset:
      [d] https://github.com/bestpractical/rt/commit/917c211820590950f7eb0521f7f43b31aeed44c4

      Thomas, could you please confirm [d] is the proper fix for 2) issue? Thank you.
      (* Redirect users to their desired pages after login.)

   3) * Clone Scrip's TicketObj since we change the CurrentUser and it can leak
      information (Custom field values, etc)

      Further issue details:
      A security flaw was found in the way the RT3 ticketing
      system handled logging of SQL queries during performing
      of user account transition. A remote, authenticated RT3
      user could use this flaw to obtain sensitive information.

      References:
      [i]  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614576
      [ii] http://lists.bestpractical.com/pipermail/rt-announce/2011-February/000186.html

      Upstream changeset (needs confirmation from upstream if it's
      real fix for the issue yet):
      [iii] https://github.com/bestpractical/rt/commit/56e20b874e8d67ab93aa80c2c00155110a27e764

      Shawn, could you please confirm [iii] is the proper fix for 3) issue?
      (* Clone Scrip's TicketObj since we change the CurrentUser and it can leak)

      If [iii] not being the correct one for 3) issue, could you point us
      to the right one? Thank you.


Steve, once patches confirmed, could you allocate CVE ids for the 2), and 3) issues?

Thanks && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.